Author of the publication

Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.

, , , , , , , , , , and . UIC/ATC/ScalCom, page 1397-1401. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-driven discovery of free-form governing differential equations., , , , , and . CoRR, (2019)Hybrid computational intelligence based kinematic analysis for parallel machine tool., , and . SMC, page 2763-2768. IEEE, (2003)Towards a flash search engine based on expressive semantics., , , , and . WWW (Alternate Track Papers & Posters), page 472-473. ACM, (2004)Automatic detection of Flash movie genre using Bayesian approach., , , , and . ICME, page 603-606. IEEE Computer Society, (2004)Multiscale Representation of 3D Surfaces via Stochastic Mesh Laplacian., and . Comput. Aided Des., (2019)Towards Scalable Gaussian Process Modeling., , and . CoRR, (2019)A new semantic model with applications in a multimedia database system., , , and . Concurr. Comput. Pract. Exp., 21 (5): 691-704 (2009)应用反向学习和差分进化的群搜索优化算法 (Group Search Optimization with Opposition-based Learning and Differential Evolution)., , , and . 计算机科学, 45 (6A): 124-129 (2018)Swept volume: a retrospective and prospective view., , , and . Neural Parallel & Scientific Comp., 5 (1-2): 81-102 (1997)A novel EMD-based Common Spatial Pattern for motor imagery brain-computer interface., , , and . BHI, page 216-219. IEEE, (2012)